Answer the question
In order to leave comments, you need to log in
Attack on a session in Internet banking
I often come across recommendations for safe work in information security, the need to “accelerate” without fail.
How can an attack on a secure IS connection be carried out? Does anyone know how to deal with this kind of attacks?
Answer the question
In order to leave comments, you need to log in
Two factors are not always a panacea. Very often, accountants leave the token stuck in the computer so as not to make unnecessary movements. Like any other USB device, the token can be “forwarded”, for example, via RDP, to the attacker’s computer, or it can be used remotely. This is the simplest thing that comes to mind, as always there are many options. So, where there is really critical information, such as payment, it is better not to leave active sessions unattended.
It seemed to me that now everyone has already introduced two-factor authorization in IB.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question